AU2011327986B2 - Protection against passive sniffing - Google Patents

Protection against passive sniffing Download PDF

Info

Publication number
AU2011327986B2
AU2011327986B2 AU2011327986A AU2011327986A AU2011327986B2 AU 2011327986 B2 AU2011327986 B2 AU 2011327986B2 AU 2011327986 A AU2011327986 A AU 2011327986A AU 2011327986 A AU2011327986 A AU 2011327986A AU 2011327986 B2 AU2011327986 B2 AU 2011327986B2
Authority
AU
Australia
Prior art keywords
cryptographic algorithm
alg
electronic device
algorithm
masking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
AU2011327986A
Other languages
English (en)
Other versions
AU2011327986A1 (en
Inventor
Julien Bringer
Herve Chabanne
Thanh Ha LE
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Idemia Identity and Security France SAS
Original Assignee
Idemia Identity and Security France SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Idemia Identity and Security France SAS filed Critical Idemia Identity and Security France SAS
Publication of AU2011327986A1 publication Critical patent/AU2011327986A1/en
Application granted granted Critical
Publication of AU2011327986B2 publication Critical patent/AU2011327986B2/en
Assigned to IDEMIA IDENTITY & SECURITY FRANCE reassignment IDEMIA IDENTITY & SECURITY FRANCE Request to Amend Deed and Register Assignors: MORPHO
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
AU2011327986A 2010-11-08 2011-11-08 Protection against passive sniffing Active AU2011327986B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FR1059208 2010-11-08
FR1059208A FR2967322B1 (fr) 2010-11-08 2010-11-08 Protection contre les ecoutes passives
PCT/FR2011/052602 WO2012062994A1 (fr) 2010-11-08 2011-11-08 Protection contre les ecoutes passives

Publications (2)

Publication Number Publication Date
AU2011327986A1 AU2011327986A1 (en) 2013-05-30
AU2011327986B2 true AU2011327986B2 (en) 2016-08-18

Family

ID=44168939

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2011327986A Active AU2011327986B2 (en) 2010-11-08 2011-11-08 Protection against passive sniffing

Country Status (12)

Country Link
US (1) US9847879B2 (ru)
EP (1) EP2638660B1 (ru)
CN (1) CN103404073B (ru)
AU (1) AU2011327986B2 (ru)
BR (1) BR112013012216B1 (ru)
CA (1) CA2816933C (ru)
FR (1) FR2967322B1 (ru)
IL (1) IL226229A (ru)
MY (1) MY160671A (ru)
RU (1) RU2579990C2 (ru)
SG (1) SG190188A1 (ru)
WO (1) WO2012062994A1 (ru)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2995111B1 (fr) * 2012-09-04 2015-07-24 Morpho Protection contre canaux auxiliaires
EP3246899A1 (en) * 2015-01-15 2017-11-22 Mitsubishi Electric Corporation Random number expanding device, random number expanding method, and random number expanding program
CN106254382B (zh) * 2016-09-13 2020-02-18 浙江宇视科技有限公司 媒体数据的处理方法及装置
CN107466453B (zh) * 2017-03-16 2020-11-24 深圳大趋智能科技有限公司 Des软件防dpa攻击的方法及装置
EP3557471B1 (en) 2018-04-20 2022-08-03 ARM Limited Power rail noise monitoring to detect attempted security tampering or side channel attacks
CN109617667B (zh) * 2018-09-17 2020-09-29 中国科学院信息工程研究所 一种针对aes算法线性部分的高效掩码防护方法
FR3095709B1 (fr) * 2019-05-03 2021-09-17 Commissariat Energie Atomique Procédé et système de masquage pour la cryptographie
US11640276B2 (en) 2020-11-17 2023-05-02 Kyndryl, Inc. Mask device for a listening device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060002548A1 (en) * 2004-06-04 2006-01-05 Chu Hon F Method and system for implementing substitution boxes (S-boxes) for advanced encryption standard (AES)

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7292693B1 (en) * 1998-08-13 2007-11-06 Teledyne Technologies Incorporated Deterministically generating block substitution tables which meet a given standard of nonlinearity
DE19940341A1 (de) * 1999-08-25 2001-03-01 Kolja Vogel Verfahren zum Schutz von Daten
FR2820577B1 (fr) * 2001-02-08 2003-06-13 St Microelectronics Sa Procede securise de calcul cryptographique a cle secrete et composant mettant en oeuvre un tel procede
US7899190B2 (en) * 2004-04-16 2011-03-01 Research In Motion Limited Security countermeasures for power analysis attacks
FR2875318A1 (fr) * 2004-09-15 2006-03-17 St Microelectronics Sa Protection d'un algorithme des
WO2008064704A1 (en) * 2006-11-30 2008-06-05 Telecom Italia S.P.A Method and device for preventing information leakage attacks on a device implementing a cryptographic function
US7970129B2 (en) * 2007-04-19 2011-06-28 Spansion Llc Selection of a lookup table with data masked with a combination of an additive and multiplicative mask
US8582765B2 (en) * 2007-08-01 2013-11-12 Stmicroelectronics S.A. Masking of data in a calculation
FR2941342B1 (fr) * 2009-01-20 2011-05-20 Groupe Des Ecoles De Telecommunications Get Ecole Nat Superieure Des Telecommunications Enst Circuit de cryptographie protege contre les attaques en observation, notamment d'ordre eleve.

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060002548A1 (en) * 2004-06-04 2006-01-05 Chu Hon F Method and system for implementing substitution boxes (S-boxes) for advanced encryption standard (AES)

Also Published As

Publication number Publication date
IL226229A (en) 2017-03-30
CA2816933C (fr) 2018-06-12
FR2967322B1 (fr) 2012-12-28
MY160671A (en) 2017-03-15
EP2638660A1 (fr) 2013-09-18
FR2967322A1 (fr) 2012-05-11
CN103404073A (zh) 2013-11-20
CA2816933A1 (fr) 2012-05-18
EP2638660B1 (fr) 2015-01-07
CN103404073B (zh) 2016-09-07
SG190188A1 (en) 2013-06-28
WO2012062994A1 (fr) 2012-05-18
BR112013012216B1 (pt) 2021-01-26
RU2579990C2 (ru) 2016-04-10
AU2011327986A1 (en) 2013-05-30
US20130230170A1 (en) 2013-09-05
US9847879B2 (en) 2017-12-19
IL226229A0 (en) 2013-07-31
BR112013012216A2 (pt) 2016-08-09
RU2013126539A (ru) 2014-12-20

Similar Documents

Publication Publication Date Title
AU2011327986B2 (en) Protection against passive sniffing
US9497021B2 (en) Device for generating a message authentication code for authenticating a message
CN106100823B (zh) 保护密码装置
WO2013083485A1 (en) Cryptographic method for protecting a key hardware register against fault attacks
EP3304801B1 (en) System and method for protecting a cryptographic device against fault attacks while performing cryptographic non-linear operations using linear error correcting codes
WO2017114739A1 (en) System and method for hiding a cryptographic secret using expansion
EP3054620A1 (en) System and method for performing block cipher cryptography by implementing a mixer function that includes a substitution-box and a linear transformation using a lookup-table
CN113784342B (zh) 一种基于物联网终端的加密通讯方法及系统
US11882101B2 (en) Methods and devices for generating a symmetric session key for encrypted communication
Liu et al. Improving tag generation for memory data authentication in embedded processor systems
TWI381696B (zh) 基於利用個人化秘密的rsa非對稱式密碼學之使用者認證
US10305678B2 (en) Imbalanced montgomery ladder
Drăguşin et al. A Brief Overview Of Current Encryption Techniques Used In Embedded Systems: Present And Future Technologies
EP3258639A1 (en) Cryptography apparatus protected against side-channel attack using constant hamming weight substitution-box
Rivain On the physical security of cryptographic implementations
Zhang et al. Revisiting and Evaluating Software Side-channel Vulnerabilities and Countermeasures in Cryptographic Applications
Mieno et al. Formal Verification of Authenticated Encryption with Associated Data with Tamarin Prover
Antheunisse et al. Cryptography with Backdoors
Knospe et al. Towards Secure and Privacy‐Enhanced RFID Systems
Mathur et al. Timing Side Channel Attack Implementation And Countermeasure For An AES-ECC Hybrid System

Legal Events

Date Code Title Description
FGA Letters patent sealed or granted (standard patent)
HB Alteration of name in register

Owner name: IDEMIA IDENTITY & SECURITY FRANCE

Free format text: FORMER NAME(S): MORPHO